Title

Dominating the attacker: Use of intelligence and counterintelligence in cyberwarfare

Document Type

Journal Article

Publisher

Mindsystems Pty. Ltd.

Faculty

Computing, Health and Science

School

Computer and Information Science

RAS ID

342

Comments

Originally published as: Davey, J., & Armstrong, H. (2002). Dominating the attacker: Use of intelligence and counterintelligence in cyberwarfare. Journal of Information Warfare, 2(1), 23-31. Original article available here

Abstract

In the event of cyberwarfare the defender must harden the attacker’s target by secure design, a defined security perimeter, and a suite of tools. Indeed, the defender must be ever alert and ready to react to attack. Over many years, defenders in traditional warfare have learned to predict the style, magnitude and possible outcomes of a physical attack, and how to deceive and confuse an attacker with the objective of changing the outcome. Perhaps the cyberwarfare defender can take a similar approach, by employing intelligence and counterintelligence techniques that are superior to those of the attacker.

 
COinS